Step 2: Install GPG on your Operating System

Like I said before, getting your email protected is a two-step process. First, we have to get GPG installed on our operating system. Getting Gmail set up is on the next step.

I got GPG working on Mac OS X without too much trouble. I used the instructions and downloads at http://macgpg.sourceforge.net/ and summarized the process below. If you're on OS X, open that link in another window and get ready. For other operating systems, you can check the links on http://www.gnupg.org/download/.

Now, start downloading and installing! I've adapted the information from the Mac GPG FAQ, so you can also go there for more details. Here are the things I downloaded (you should got to the downloads page and get the latest):

First, open the DMG for GPG that you downloaded and run the installer. I just used all the defaults. This is the actual encryption engine that everything else runs on.

Once the installation is complete, open a Terminal window and type gpg, then hit [Return]. My installation gave me a "Go ahead and type your message ..." which I think means that GPG was up and running, so I ctrl-C'd out of that and closed the Terminal window.

Next, I installed GPG Preferences. That put a GPG icon in my System Preferences pane; I didn't change anything.

Finally, I installed GPG Keychain Access. This was easy: just unzip the ZIP file and drag the application into your Applications folder.

<p>Sounds good, but I don't care if the government/hackers reads my emails. </p>

<p>That's what you think now. But, tomrrow, what you said yesterday may be deemed subversive by a new oppressive government.</p>

<p> I do care... </p>

<p>As Snowden so aptly put it: <b>&quot;Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.&quot;</b></p>

<p>t r i g g e r e d</p>

Well that's right, if I didn't have anything to say I wouldn't care about free speech either. <br><br>You people are funny. So many of you really seem to care so much about the fact that I don't care if the government reads my emails. I still don't care. Read away Uncle Sam! :)

<p>That's exactly what i as going to say that. :)</p>

<p>I know this is 2 years old, but... What is the point in you making such a useless comment? You came to a guide on how to encrypt your e-mail just to say you don't care if people can read your e-mail?</p>

<p>If you're buying illegals on the darknet then yeah mabye, unless you have a prison wish.</p>

<p>For purchasing Illegals on the darknet, yeah.</p>

I thought at <a href="http://www.techsonite.com/gmail-comsign-gmail-comsignup-page-registration-details/" rel="nofollow">Gmail Sign Up</a>, you get all these benefits automatically?

whenever i try to upload an instructable it says &quot;verufy your email&quot;how in the world do i do that?

<p>I guess to confirm that your are not a bot :)</p>

<p>PGP encryption no longer meets the definition of a non-exportable weapon as of year 2000. Myths abound on the internet.</p>

How to encrypt saved emails?

<p>all I want is my email</p>

<p>&quot;The two keys work together so that you need both to decrypt anything.&quot;<br>I believe this is wrong. You should only need the private key to decrypt, which is also what is shown in your diagram.<br>Unless you are referring to signing, which does have an decryption step using the public key at the receiver.</p>

ok, so M.R (?)<br>Lete get started <br>

ok, so M.R (?)<br>Lete get started <br>

protection of https://privatoria.net/

<p>I prefer 'double encryption' The service that I use </p><p>https://privatoria.net/ encrypts my text message and sends it over a secure SSL channel. That way you'll have to break one encryption just to get to another one</p>

<p>I also prefer the protection of https://privatoria.net/</p><p>It is easy to use and secure.</p>

<p>what bin did you rescue that computer from?</p>

Hasn't been cracked? C'mon, a cipher cracking util run on the fastest desktop PC would take about 22,000 years to decipher. On the other hand, the NSA's "BrainChild" supercomputer can solve it in about 20 minutes. So, it really depends on who you are trying to hide information from...

Actually, agents from the Secret Service themselves are admitting that if something is encrypted with PGP, it's pretty much impossible even for them to crack (mentioned in <a rel="nofollow" href="http://www.cbsnews.com/stories/2008/02/07/tech/main3804858.shtml?source=RSSattr=HOME_3804858">this article</a>). The NSA may be able to crack it, but I've seen no published cases on this. It seems like if someone encrypts with PGP, anyone (including the government) wanting to decrypt the info tries to just find ways to swipe the key from somewhere, instead of a &quot;brute force&quot; method.<br/>

For all we know, they could already have cracked it a long time ago, and they already read everything encrypted or not. They just aren't telling us to give us a false sense of security.

<p>thanks to Snowden we know they haven't :) http://www.theverge.com/2014/12/28/7458159/encryption-standards-the-nsa-cant-crack-pgp-tor-otr-snowden</p>

The thing is, with enough time anything can be cracked but without knowing how long the original passphrase was it's pretty hard to do anything. My passphrase is in the neighborhood of 16+ characters which means they would have to make a list of all the possible strings that are 16 characters long, 17 characters long, etc until they cracked it. Without knowing that my passphrase is 16 characters at least though, you'd have to run through all the 1 character, 2 character, 3 character, 4 character, etc. passwords possible and finally be able to crack the passphrase. It'd take a wicked long time but eventually anything can be bruteforced.
Just me $.02

If you were a suspect for a crime, they would probably just install malware on your computer, steal your password and not have to brute force anything. Or they can force you to reveal your passwords with torture or sever criminal penalties.

l2crypto https://class.coursera.org/crypto-preview/lecture/index <br> <br>Its all about reducing your odds. The best method for decrypting hashes is rainbow tables but that was solved by adding salt to the hash's. Private Public key crypto is much more complex by requiring multiple factors required to decrypt ans since gpg is an opensource crypto its been reviewed publically by many its very difficult to decrypt anything gpg related without two things your private key and your passphrase. You'd really have to try hard to replicate either of these things.

<p>In addition to keep the message private when it is transmitted between the sender and the receiver, does GPG keep the message encrypted in each party's mailbox? If not the case then how can I have my message stored in my Gmail mailbox in a way that even for Google couldn't read it?</p>

<p>I could also recommend www.securencrypt.com . It's free, has trusted lists, comes with encryption for emails, files and even SMS if you use the mobile version. </p>

I tired Galaxkey thanks for telling me about it, its really great! so easy to use. <br> <br>www.galaxkey.com <br> <br>P

Find out how to encrypt your mail in Chrome and Mozilla in a very simple steps, no need to be tech savvy to do this work. <br> <br>Learn how to Encrypt your mail in Gmail using Chrome <br> <br>http://www.techxure.com/2013/01/encrypt-your-mail-using-safe-gmail.html <br> <br>and also see how you can encrypt your mail in Mozilla <br> <br>http://www.techxure.com/2013/03/encrypt-your-mail-in-mozilla-firefox.html

You can also try: <br>www.safegmail.com <br> <br>It's a browser extension for Gmail, PGP like.

Yup now a days gmail has 2 step security features also so no 1 can hack your mail. <br>&lt; a href=&rdquo;http://thexbit.com&rdquo;&gt;

This is the beast service for Secure Encripted Email!<br>http://securitykrypto.blogspot.com/2011/09/secure-email.html

Yeah is true, i use this service from 11 month and is really Excellent! <br>they have also a very good support.<br>For who want know more go here http://en.kryptotel.net/kryptomail.html